Quick Look: Find Map, Get Treasure, Avoid Pirates--Data Security and Privacy Best Practice

The best practices of data security and privacy are like playing "Treasure Hunt." Imagine yourself in a tropical paradise. You need to find and guard a cache of valuable buried treasure. Learn about these top 10 data security and privacy best practices based on working with hundreds of clients. We'll cover tips, tricks and stories to help you find and guard your own "crown jewels" and keep pirates away.



Cindy Compert Cybersecurity Leader, US Public Sector Markets – CTO Data Privacy and Security, IBM Security

← View more Videos

This document was retrieved from on Fri, 19 Jul 2019 04:28:33 -0400.